Important Questions e Business
Important Questions e Business
Web 2.0 is the name used to the describe the second generation of the world
wide web, where it moved static HTML pages to a more interactive and
dynamic web experience. Web 2.0 is focused on the ability for people to
collaborate and share information online via social media, blogging and Web-
based communities
Intranets
Corporate intranets house internal memos, corporate policy handbooks,
expense account worksheets,budgets, newsletters, and a variety of other
corporate documents.
4, Define extranet?
Extranets
• Extranets are intranets that allow certain authorized parties outside the
company to access certain parts of the information stored in the system
5, What is e-tailing?
Electronic retailing (E-tailing) is the sale of goods and services through the
Internet. E-tailing can include business-t business (B2B) and business-to-
      consumer (B2C) sales of products and services. E-tailing requires companies to
      tailor their business models to capture Internet sales, which can include
      building out distribution channels such as warehouses, Internet webpages, and
      product shipping centers.
      8, Define cryptography?
          Cryptography is associated with the process of converting ordinary plain text
          into unintelligible text and vice-versa. It is a method of storing and
          transmitting data in a particular form so that only those for whom it is
          intended can read and process it. Cryptography not only protects data from
          theft or alteration, but can also be used for user authentication
          Cyber law is a term used to describe the legal issues related to use of
          communications technology, particularly“ cyberspace”, i.e. the Internet. It is
          less of a distinct field of law in the way that property or contract are, as it is
          an intersection of many legal fields including intellectual property,
          privacy, freedom of expression, and jurisdiction
PART-B (5 X 13 = 65 Marks)
Merchant server
  Act as forums through which Internet users canlog-on and assume the role
of either bidder orseller. Collect a commission on every successfulauction      As
a seller, you are able to post an item youwish to sell, the minimum price you
require tosell your item and a deadline to close theauction.As a bidder, you
may search the site for theavailability of the item you areVseeking, view the
current bidding activity and place a bid(bids areusually in designated
increments).Auction sites allow you to add features such asphoto graph or
description of the item’s condition
After the auction has completed the seller and bidderis notified and the method
of delivery is to work outbetween the two parties. In Auction model the site
only receive commission
on each successful sale.
3. PORTAL MODEL
  Portal comes from the word “Port” point ofentry to the country so Web
Portal o EBusiness portal means Point of entering tothe Web.Portal sites give
visitors the chance to find almost everything they are looking for in
oneplaceOften offer news, sports and weather as well as ability to search the
Web
PORTAL MODEL
(Or)
b) (i) what are the key difference between e-commerce and e-business? (8)
BASIS FOR
                        E-COMMERCE                   E-BUSINESS
COMPARISON
Is it limited to        Yes                          No
monetary
transactions?
 Purchase goods
 Purchase services
 Purchase content
       Yes
                                                                           Business   Yes
                                                                   No
                                                                           analysis
                     Stop
                                                              Marketing
                                                                plan
                                        Definition and
                                             use
                                          of market
                                           analysis
                                                         No
                                                                 Busine
                                                                 ss plan
   •   The following core issues for business models were identified and
       defined:
   •   the positioning of the mobile operator taking into account its strategic
       advantages
   •   Betting is always time sensitive, people always want to bet just before
       the match or race begins. Therefore the application has to allow quick
       and easy usage.
   •   Users could send their bets and check their status using text-based
       technologies like SMS or WAP.
• mobile micropayment.
Materials suppliers
Product Suppliers
Manufacturer Retailer
Customer
(Or)
– Hardware
• An important first step in planning a Web server is todetermine what the company
wants to accomplish with the server.
• The company must estimate how many visitors will be connecting to the Web site and
what types of files will be delivered through the site.
Development Sites
• The simplest Web site and the least costly to implement is a development site.
• A development site can reside on an existing PC and can be developed with low-cost
Web site building tools, such as Microsoft FrontPage or Macromedia
Dreamweaver.
existing LAN.
The Future of Dynamic Web Page
Generation
• The Apache Cocoon Project is an initiative where content is stored with XML tags that
describe the meaning of each content item.
• Instead of creating a Web page, Cocoon can produce a response tailored to the request
by applying a style sheet to the data.
• Server – any computer used to provide files to other computers connected to it through
a network.
– Server software
– Database server
– It is important to ask qualifying questions when determining what one might mean by
“server”.
• A computer must have an operating system to run programs as well as keep track of
multiple users logged on to the system to ensure that they do not interfere with one
another.
• The most common operating systems for Web servers from Microsoft are: Windows NT
Server, Windows 2000
• Unix-based products are also popular: Linus, Solaris, and FreeBSD Web Server
Software
today:
– Apache
– HTTP Server
• With remote server administration, a Web site administrator can control a Web site
from any
Internet-connected computer.
   •   Sending one e-mail message to a customer can cost less than one cent if the
       company already has the customer’s e-mail address
   •   Conversion rate
          – The percentage of recipients who respond to an ad or promotion
   •   Opt-in e-mail
          – Practice of sending e-mail messages to people who request information on
             a particular topic Technology-Enabled Customer Relationship
             Management
   •   Clickstream
          – Information that a Web site can gather about its visitors
   •   Technology-enabled relationship management
          – Firm obtains detailed information about a customer’s behavior, buying
             patterns, etc., and uses it to set prices and negotiate terms
   •   Domain names
•   Companies often buy more than one
•   Reason for additional domain names is to ensure that potential site visitors who
    misspell the URL will still be redirected to the intended site
•   Example: Yahoo! owns the name Yahow.com
•
•
(Or)
(ii) Explain the various types of web portal with examples (8)
•   Companies are now using the Web to operate auction sites, create virtual
    communities, and serve as Web portals
• B2B auctions
•   New companies have formed that capitalize on the Web’s ability to bring together
    geographically dispersed people and organizations
•   Organizations are using mobile commerce to sell goods and services to users of
    handheld devices
payments −
Credit Card
Debit Card
Smart Card
E-Money
Credit Card
Payment using credit card is one of most common mode of electronic payment. Credit
card is small
plastic card with a unique number attached with an account. It has also a magnetic strip
embedded in it which is used to read credit card via card readers. When a customer
purchases a product via credit card, credit card issuer bank pays on behalf of thecustomer
and customer has a certain time period after which he/she can pay the credit card bill. It is
usually credit card monthly payment cycle. Following are the actors in the credit card
system. The card holder − Customer
The merchant − seller of product who can accept credit card payments.
Step 1 Bank issues and activates a credit card to the customer on his/her request.
Step 2 The customer presents the credit card information to the merchant site or to the
merchant
Step 3 Merchant validates the customer's identity by asking for approval from the card
brand
company.
Step 4 Card brand company authenticates the credit card and pays the transaction by
credit.
Step 5 Merchant submits the sales slip to acquirer banks and gets the service charges paid
to
him/her.
Step 6 Acquirer bank requests the card brand company to clear the credit amount and gets
the
payment.
Step 6 Now the card brand company asks to clear the amount from the issuer bank and
the amount
Debit Card
Debit card, like credit card, is a small plastic card with a unique number mapped with the
bank account number. It is required to have a bank account before getting a debit card
from the bank. The major difference between a debit card and a credit card is that in case
of payment through debit card, the amount gets deducted from the card's bank account
immediately and there should be sufficient balance in the bank account for the transaction
to get completed; whereas in case of a credit cardtransaction, there is no such
compulsion.
Debit cards free the customer to carry cash and cheques. Even merchants accept a debit
card readily. Having a restriction on the amount that can be withdrawn in a day using a
debit card helps the customerto keep a check on his/her spending.
Smart Card
Smart card is again similar to a credit card or a debit card in appearance, but it has a
smallmicroprocessor chip embedded in it. It has the capacity to store a customer’s work-
related and/or personal information. Smart cards are also used to store money and the
amount gets deducted after every transaction.
Smart cards can only be accessed using a PIN that every customer is assigned with. Smart
cards are secure, as they store information in encrypted format and are less
expensive/provides faster processing.
E-Money
E-Money transactions refer to situation where payment is done over the network and the
amount gets transferred from one financial body to another financial body without any
involvement of a middleman. E-money transactions are faster, convenient, and saves a lot
of time. Online payments done via credit cards, debit cards, or smart cards are examples
of emoney transactions. Another popular example is e-cash. In case of e-cash, both
customer and merchant have tosign up with the bank or company issuing e-cash.
It is a very popular electronic payment method to transfer money from one bank account
to another bank account. Accounts can be in the same bank or different banks. Fund
transfer can be done using
customer's account. Once the amount is transferred to other account, the customer is
notified of the fund transfer by the bank.conventional paper cheque. Because the cheque
is in an electronic format, it can be processed in fewer steps and has more security
features than a standard paper cheque. Security features provided byelectronic cheque
include authentication, public key cryptography, digital signatures and encryption,among
others.
The e-Cheque is compatible with interactive web transactions or with email and does not
depend on real-time interactions or on third party authorizations. It is designed to work
with paper cheque practices and systems, with minimum impact on payers, payees, banks
and the financial system. Payers and payees can be individuals, businesses, or financial
institutions such as banks.
  E- Cheques are transferred directly from the payer to the payee, so that the timing and
the purpose of the payment are clear to the payee.
  The payee receives the e-Cheque over email or web, verifies the payer's digital
signature, writes out a deposit and digitally signs it.
  The payee's bank verifies the payer's and payee's digital signatures, and then forwards
the cheque for clearing and settlement.
  The payer's bank verifies the payer's digital signature and debits the payer's account.
       (Or)
Security Protocols
TCP/IP is the standard set of protocols used for communication between computers on
the Internet. Most Internet transmissions are sent as sets of individual message pieces,
called packets. At the sending side, the packets of one message are numbered
sequentially, and error-control information is attached to each packet. TCP/IP routes
packets to avoid traffic jams, so each packet might travel a different route over the
Internet. At the receiving end, TCP/IP makes sure that all of the packets have arrived,
puts them in sequential order and determines if the packets have arrived without
alteration. If the packets have beenaltered, TCP/IP retransmits them.
The Secure Electronic Transaction (SET) protocol, developed by Visa International and
the customer, the merchant and the merchant’s bank. Public-key cryptography is used to
secure
Merchants must have a digital certificate and special SET software to process
transactions.
Customers must have a digital certificate and digital wallet software. A digital wallet is
similar to a real
wallet; it stores credit (or debit) card information for multiple cards, as well as a digital
certificate
Digital wallets add convenience to online shopping; customers no longer need to reenter
their
merchant’s SET software sends the order information and the merchant’s digital
certificate to the
The customer selects the credit card to be used for the transaction. The credit-card and
order
information are encrypted by using the merchant’s bank’s public key and sent to the
merchant along
with the customer’s digital certificate. The merchant then forwards the information to the
its bank to process the payment.
Only the merchant’s bank can decrypt the message, since the message was encrypted
using the bank’s public key. The merchant’s bank then sends the amount of the purchase
and its own digital
certificate to the customer’s bank to get approval to process the transaction. If the
customer’s charge is approved, the customer’s bank sends an authorization back to the
merchant’s bank.
The merchant’s bank then sends a credit-card authorization to the merchant. Finally, the
merchant sends a confirmation of the order to the customer.
4.9.1 Firewalls
A basic tool in network security is the firewall. The purpose of a firewall is to protect a
local area network (LAN) from intruders outside the network.
Each LAN can be connected to the Internet through a gateway, which usually includes a
firewall. For years, one of the biggest threats to security came from employees inside the
firewall. Now that businesses rely heavily on access to the Internet, an increasing number
of security threats are originating outside the firewall—from the hundreds of millions of
people connected to thecompany network by the Internet.
A firewall acts as a safety barrier for data flowing into and out of the LAN. the need for
securityversus the need for functionality.
1. packet-filtering firewalls
2. Application-level gateways.
A packet-filtering firewall examines all data sent from outside the LAN and
automatically rejects any data packets that have local network addresses.
The goal of an application-level gateway is to screen the actual data. If the message is
deemed safe, then the message is sent through to the intended receiver.
4.9.2 Kerberos
Firewalls do not protect you from internal security threats to your local area network.
Internal attacks are common and can be extremely damaging. Kerberos is a freely
available, open-source protocol developed at MIT. It employs symmetric
The main Kerberos system authenticates a client’s identity to the TGS; the TGS
authenticates client’s rights to access specific network services. Each client in the
network shares a symmetric secret key with the Kerberos system.
This symmetric secret key may be used by multiple TGSs in the Kerberos system. The
client starts by entering a login name and password into the Kerberos authentication
server. The authentication server maintains a database of all clients in the network. The
authentication server returns a Ticket-Granting Ticket (TGT) encrypted with the client’s
symmetric secret key that it shares with the authentication server.
Symmetric secret key isknown only by the authentication server and the client, only the
client can decrypt the TGT, thus authenticating the client’s identity. Next, the client sends
the decrypted TGT to the Ticket Granting Service to request a service ticket. The service
ticket authorizes the client’s access to specific network services. Service tickets have a set
expiration time. Tickets may be renewed by the TGS.
Right to Privacy
The right of the people to be secure in their persons, houses, papers, and effects, against
unreasonable searches and seizures, shall not be violated, and no Warrant shall issue, but
upon probable cause, supported by Oath or affirmation, and particularly describing the
place to be searched, and the
person or things to be seized.
the Internet industry essentially governs itself. This condition enables the Internet to
flourish without the constraints of legislation, but it also creates problems because there
are few specific guidelines to follow.Many Internet companies collect users’ personal
information as the users navigate through asite.
While privacy advocates argue that these efforts violate individuals’ privacy rights,
online marketers and advertisers disagree; they suggest that, by recording the likes and
dislikes of online consumers, online companies can better serve their users.
For example, if you visit an online travel site and purchase a ticket from Boston to
Philadelphia, the travel site might record this transaction. In the future, when a ticket goes
on sale for the same flight, the Web site can notify you.
Users are able to take on falsified identities, pseudonymity, or use software to maintain
anonymity on the Web. The Worldwide Web Consortium is introducing the Platform for
Privacy
The Consortium will release a questionnaire to users who have downloaded a newer
version of the more popular browsers (e.g., Netscape Navigator and Internet Explorer)
asking individual users about the level of privacy they desire. The P3P privacy policies
are XML-based applications. This system allows the user’s preferences to be matched
accurately to the site’s standardized privacy protocols. While it will prompt users if the
privacy policy of a particular Web site does not match the users’ given preferences, it
does not enforce Web sites to abide by their own policies
5.1.1.6 Protecting Your Business: Privacy Issues
It is important to include a privacy policy on your Web site, respect the stated policy and
treat your visitors’ information with care. This means conducting regular audits to know
exactly what information is being collected through your site. There are several services
available over the Web that can generate a privacy policy according to your needs.
(Or)
Introduction on Taxation
Electronic Commerce (“Ecommerce”) presents unique challenges to federal and state tax
authorities. Ecommerce involves commerce using the Internet: typically purchases and
sales through computers. Because Ecommerce involves computers communicating with
each other at the speed of light, transactions are both instantaneous and largely
anonymous. In contrast, mail order and telephone solicitation, two traditional forms used
by remote sellers, involve the delivery of goods from a specific physical location to a
specific location by means of a common carrier.
Although states and local jurisdictions have wrestled with the issue of collecting taxes
from out-of-state mail order sellers and telephone solicitors for decades, the internet
allows almost any small business to sell to customers in different states and countries.
The concept of taxation involves jurisdiction. From the Boston Tea Party Rebellion in
which tea was taxed as it physically landed on American shores, to sophisticated concepts
    in international taxation, a government’s authority to tax has always been based on
    territory and jurisdiction. For instance, the U.S. government taxes its residents on their
    world-wide income because they are connected with the U.S. through citizenship and
    residency. Also, the U.S. taxes foreign individuals and businesses who are receiving
    income from U.S. sources. But the U.S. cannot tax a foreign citizen who is not a U.S.
    resident on earnings from a foreign source.
    With the internet, a business can move to so-called tax haven jurisdictions and conduct
    business outside the taxing jurisdiction of any country. Also, because of the speed in
    which transactions occur and the absence of a traditional paper trail, especially with
    intangible property transmitted by computer such as software, digital music or books and
    services, it will be very difficult, if not impossible to apply traditional notions of
    jurisdiction to tax these transactions.
    While governments who rely on an income tax to fund themselves will have great
    difficulty taxing Ecommerce, states and local jurisdictions that rely on sales and property
    taxes to fund their operations are in steep trouble. As discussed below, the U.S.
    constitution requires a sufficient physical connection with the state or local jurisdiction
    by a company to burden the business with a tax obligation, and merely selling property,
    services or goods to a customer who resides in a state is not sufficient nexus.
    In short, it will take a Constitutional amendment to change the commerce clause, and it
    extremely doubtful that U.S. citizens will vote to tax themselves on internet transactions.
    In fact, outside of pressure from state and local tax authorities, there is little ground swell
    for internet taxation by politicians. According to a Gallup Poll, 73% of active internet
    users oppose an internet sales tax, compared to 14% in favor (Source: San Francisco
    Chronicle, September 15, 1999, page D2). According to 36% of the respondents who use
    the internet, they would be less likely to vote for a politician who voted to tax internet
    transactions. But brick and mortar retailers who sell their products in physical locations,
    contend that internet taxes are needed to equalize the tax burden for competitive reasons.
Discriminatory Taxes
           Multiple Taxes
           Exceptions to ITFA transactions.
           Taxation of Ecommerce - The Significant Issues
           Will Ecommerce Really Erode the Tax Base for States and Localities
    The Commission on Electronic Commerce, created by the ITFA legislation, has not been
    able to make any headway in the taxation debate, but several members have voice
    support for Internet taxes, provided the tax is simple to calculate for businesses. This
    could mean a uniform tax rate agreed to by all the states, or technological advances that
    would allow businesses to calculate the sales tax simply and without a large investment in
    time and resources.
    Unfortunately, the current state and local tax systems, which number close to 7,500
    throughout the U.S., are notoriously parochial minded when it comes to defending their
    jurisdiction. In Texas alone, there are more than 1,300 separate sales tax jurisdictions.
    These numbers could be significantly increased if states and local jurisdictions were
    allowed to tax Ecommerce.
    Small businesses would be buried in costly paperwork attempting to comply with all
    these rules. That is precisely why the commerce clause in the Constitution prohibits taxes
    and is an undue burden on interstate commerce.
    Encryption policy:
    Encryption is a technique for hiding data. The encrypted data can be read only by those
    users for whom it is intended. Nowadays various encryption techniques are available.
    One of the available techniques commonly used for encryption is Public Key. In Public
    Key encryption system, RSA Data Security of Redwood City offers the most popular and
    commercially available algorithm.
    In a Public Key encryption system each user has two keys-public key and private key.
    The encryption and decryption algorithms are designed in a way so that only the private
    key can decrypt data that is encrypted by the public key. And the public key can decrypt
    data, encrypted by the private key. Therefore, one can broadcast the public key to all
    users.
    Computer encryption is based on the science of cryptography, which has been used
    throughout history. Before the digital age, the biggest users of cryptography were
    governments, particularly for military purposes.
    Most computer encryption systems belong in one of two categories. Broadly speaking,
    there are two types of encryption methods:
    Secret-key cryptography
    Public-key cryptography
A new technique for improving the security of DES is triple encryption (Triple DES),
that is, encrypting each message block using three different keys in succession. Triple
DES, thought to be equivalent to doubling the key size of DES, to 112 bits, should
prevent decryption by a third party capable of single-key exhaustive search. Of course,
using triple-encryption takes three times as long as singleencryption DES. If you use DES
three times on the same message with different secret keys, it is virtually impossible to
break it using existing algorithms.. Over the past few years several new, faster symmetric
algorithms have been developed, but DES remains the most frequently used.
The look of a site conveys a sense of personality and influences the degree to which
visitors are prepared to trust the site owner. If an organisation already has a corporate
identity then the site should be consistent with this. On-screen design and copy styles
should reflect existing printed literature. A company’s colours may need re-working
online, to a new palette that is fast to download to the computer screen. Developing a
brand to work online is a new task. The internet is tactile - web pages should look, sound
and move in ways that reinforce the company’s existing image.
Navigation
If customers walk into a new high street shop they can usually find their way around.
There are conventions for laying out a shop and customers unconsciously understand and
    follow them. Online conventions are still being developed. Therefore, some judgement
    will be needed to make first-time visits successful.
    The challenge is to create enticement – to explore the store - without customers getting
    lost. On the home page a site’s purpose must be clear to the first-time visitor. Use simple
    words to describe the site’s content and make it easy for visitors to find what they are
    looking for by giving clear instructions.
Fulfilment
    Goods have now been selected and your customer has made it to the checkout. At this
    point most shopping carts are abandoned. Websites can keep customers’ trust by taking
    them through a transparent transaction process. At all times customers should know
    where they are in the checkout process and they should be able to find out what happens
    later. It must be easy to see: How orders are to be processed The company’s returns
    policy. Online and offline customer support services The company’s security policy for
    personal information. If you have shops on the high street, give customers the option to
    return goods there. And remember to train your staff to handle returned online orders.
    Names that we know and trust are familiar and friendly. If we see them on a website we
    trust the website more. Customers trust sites where they can see the familiar logos of
    credit card brands, major software companies and web security organizations. If your
    company is trusted by these organizations, don’t hide it. Should your company have a
    familiar name, use it to build customer expectation of the site’s content, the quality of
    products and the level of service support. Web customers will have higher service
    expectations than offline customers. They may expect service delivered in real time, with
    transparency and, above all, with consistency.
Technology
    Too much technology can be daunting. Use technology as a transparent aid to navigation
    and activity. Aim for graphics and functions in proportion to your customer’s needs.
    These needs will change with your customer’s experience. Are you handling visitors new
    to the web trade or devotees?
    Younger visitors and technically aware customers may be more tolerant of higher
    technical demands. Make sure that technology supports your sales process and does not
    obscure it: Automatically recognise returning customers Help to complete forms correctly
    Design forms to work with software programs that automatically add user details to the
    form
Respond Fast
    If the plan is to respond to customer wishes, then the most successful plan will be the one
    that responds fastest. This means that every component of the plan should be built with
    the intention of proving a principle. Ask yourself if your customers want this? If they do,
    then a more robust version can be built. If they don’t, then you can redirect your time and
    resources and use the knowledge gained to good effect elsewhere.
    In the online marketplace everything is a test until it’s proven by the customer.
    Successful testing follows a simple rule:
    Only test changes that can be measured directly. If a test includes more than one change,
    it’s almost always impossible to measure the effect of each one. Test to learn from the
    customer and to improve one step at a time.
  Not all customers will automatically move to an online service simply because it’s there.
  Equally, in a service’s early stages it may not make good sense to risk overwhelming a
  new online channel by quickly moving large numbers of customers over to the new
  service.
  If you prefer customers to use an online channel, find ways to: Inform them that it is there
  (they may not know this) Tell them how to change over Incentivise the swap to make it
  worthwhile Introduce the new service as a special privilege beta test programme
  Very few organisations have all the resources in-house to start offering online services.
  There are three sets of costs that should be calculated:
Current company costs that will be altered by the online changes both internal and external
costs
1. Cost to implement the changes interim support may be needed training for staff whose
   tasks change
2. New cost assumptions, post cha nge
long-term cost-savings
PART-C (1 X 15 = 15 Marks)
Electronic money is paperless cash. This money is either stored on a card itself or in an
account associated with the card. The most common examples are transit cards, meal
plans, and PayPal. E-Cash can also mean any kind of electronic payment. Electronic
payment systems come in many forms including virtual cheques, ATM cards, credit
cards, and stored value cards. The usual security features for such systems are privacy,
authenticity and no repudiation.
Conceptual Framework
E-Cash issuers. Issuers typically handle accounting for customers and merchants.
Purchase: Customers purchase certain goods or services, and give the merchants tokens
which represent equivalent E-Cash. Purchase information is usually encrypted when
transmitting in the networks.
Authentication: Merchants will need to contact E-Cash issuers about the purchase and the
amount of E-Cash involved. E-Cash issuers will then authenticate the transaction and
approve the amount E-Cash involved.
  The customer approaches his issuer(bank’s) site for accessing his account. The issuer
in return issues the money in form of a token which is generally in form of tens and
hundreds or as per specified by the customer.
  In second phase the customer will endorse those tokens to the merchant for acquiring
services, for which the customer will authenticate the payment for the trader.
  In third phase the trader will approach the token issuer(customer’s bank) and after
authenticating the tokens the issuing bank will convert the tokens into electronic fund and
the same will be transferred into trader’s account.
  Finally after getting the payment for the respective services the trader provides the
requisite service or product and also notifies the customer about the approval of payment
made by customer in trader’s account.
E-cash security
Security is of extreme importance while handling the online transactions. Faith in the
security of the medium of exchange, whether paper or digital, is essential for the
economy to function. E-cash is much secure than other online payment modes because in
this case no credential such as card-passwords or anything such is involved. Its like
simply the online fund transfer from customer’s account to trader’s account.
(ii) E- cheque
A form of payment made via the internet that is designed to perform the same function as
a conventional paper cheque. Because the cheque is in an electronic format, it can be
processed in fewer steps and has more security features than a standard paper cheque.
Security features provided by electronic cheque include authentication, public key
cryptography, digital signatures and encryption, among others.
The e-Cheque is compatible with interactive web transactions or with email and does not
depend on real-time interactions or on third party authorizations. It is designed to work
with paper cheque practices and systems, with minimum impact on payers, payees, banks
and the financial system. Payers and payees can be individuals, businesses, or financial
institutions such as banks.
  E- Cheques are transferred directly from the payer to the payee, so that the timing and
the purpose of the payment are clear to the payee.
  The payer writes an e-Cheque by structuring an electronic document with the
information legally required to be in a cheque and digitally signs it.
  The payee receives the e-Cheque over email or web, verifies the payer's digital
signature, writes out a deposit and digitally signs it.
  The payee's bank verifies the payer's and payee's digital signatures, and then forwards
the cheque for clearing and settlement.
  The payer's bank verifies the payer's digital signature and debits the payer's account.
PAYER PROCESS
  In order to send a cheque, the client simply fills out a standard e-cheque. The system
allows clients to define common payees in order to speed the e-cheque creation process.
  When the cheque has been written it can be easily transferred from the payer to the
payee over a secure e-cheque channel.
PAYEE PROCESS
  When the payee receives the e-cheque he can open and view it using the e-cheque
system.
  In order to deposit the cheque, the payee simply connects to the bank (which is
expected to provide e-cheque services) and uploads the e-cheque to his bank account.
  Once the bank receives the e-cheque, it will decrypt it using the e-cheque system.
  After clearing (i.e. verifying both the cheque signature and account balance) with the
(iii) E-wallets
To facilitate the credit-card order process, many companies are introducing electronic
wallet services. E-wallets allow you to keep track of your billing and shipping
information so that it can be entered with one click at participating merchants’ sites. E-
wallets also store e-checks, e-cash and your credit-card information for multiple cards.
Credit-card companies, such as Visa, offer a variety of e-wallets Some Visa e-wallets are
cosponsored by specific banks;
for example,
the SBI is available to Bank One customers for use with only a Visa/Mastercard credit or
check card. MBNA offers an e-wallet that allows the consumer to perform one-click
shopping at member sites. Its e-wallet automatically fills in transfer, shipping and
payment information on the forms of non member merchants. There are many digital
wallets on the market that are not accepted by all vendors. Visa, MasterCard and a group
of e-wallet vendors have standardized the technology with the Electronic
Commerce Modeling Language (ECML).
Web sites. Businesses are sending confidential information to clients and vendors over
the Internet. At the same time, we are experiencing increasing numbers of security
attacks. Individuals and organizations are vulnerable to data theft and hacker attacks that
can corrupt files and even shut down e-businesses. Security is fundamental to e-business.
Modern computer security addresses the various problems and concerns of protecting
electronic communications and maintaining network security.
There are four fundamental requirements of a successful, secure transaction:
1. privacy,
2. integrity,
3. authentication
4. nonrepudiation.
The privacy issue is the following: How do you ensure that the information you transmit
over the Internet has not been captured or passed on to a third party without your
knowledge? The integrity issue is the following: How do you ensure that the information
you send or receive has not been compromised or altered?
The authentication issue is the following: How do the sender and receiver of a message
prove their identities to each other? The nonrepudiation issue is the following: How do
you legally prove that a message was sent or received
(Or)
Social media marketing is the use of social media platforms and websites to promote a
product or service.
[1] Although the terms e-marketing and digital marketing are still dominant in academia,
social media marketing is becoming more popular for both practitioners and researchers
.[2] Most social media platforms have built-in data analytics tools, which enable
companies to track the progress, success, and engagement of ad campaigns. Companies
address a range of stakeholders through social media marketing, including current and
potential customers,
current and potential employees, journalists, bloggers, and the general public. On a
strategic level, social media marketing includes the management of a marketing
campaign, governance, setting the scope (e.g. more active or passive use) and the
establishment of a firm's desired social media "culture" and "tone."
[3] That interaction can be more personal to users than traditional methods of outbound
marketing and advertising.
[4] Social networking sites act as word of mouth or more precisely, e-word of mouth. The
Internet's ability to reach billions across the globe has given online word of mouth a
powerful voice and far reach. The ability to rapidly change buying patterns and product
or service acquisition and activity to a growing number of consumers is defined as an
influence network
.[5] Social networking sites and blogs allow followers to "retweet" or "repost" comments
made by others about a product being promoted, which occurs quite frequently on some
social media sites.
[6] By repeating the message, the user's connections are able to see the message,
therefore reaching more people. Because the information about the product is being put
out there and is getting repeated, more traffic is brought to the product/company
.[4]
In 2014, over 80% of business executives identified social media as an integral part of
their business.
[7] Business retailers have seen 133% increases in their revenues from social media
marketing.
Mobile phones
More than three billion people in the world are active on the Internet. Over the years, the
Internet has continually gained more and more users, jumping from 738 million in 2000
all the way to 3.2 billion in 2015.
[9] Roughly 81% of the current population in the United States has some type of social
media profile that they engage with frequently.
[10] Mobile phone usage is beneficial for social media marketing because of their web
browsing capabilities which allow individuals immediate access to social networking
sites. Mobile phones have altered the path-to-purchase process by allowing consumers to
easily obtain pricing and product information in real time
[11]. They have also allowed companies to constantly remind and update their followers.
Many companies are now putting QR (Quick
Mobile devices have become increasingly popular, where 5.7 billion people are using
them worldwide
[13]. This has played a role in the way consumers interact with media and has many
further implications for TV ratings, advertising, mobile commerce, and more.
Mobile media consumption such as mobile audio streaming or mobile video are on the
rise – In the United States, more than 100 million users are projected to access online
video content via mobile device. Mobile video revenue consists of pay-per-
view downloads, advertising and subscriptions. As of 2013, worldwide mobile phone
Internet user penetration was 73.4%. In 2017, figures suggest that more than 90% of
Internet users will access online content through their phones
[14]
Strategies
There are two basic strategies for engaging the social media as marketing tools:
Passive approach
Social media can be a useful source of market information and a way to hear customer
perspectives. Blogs, content communities, and forums are platforms where individuals
share their reviews and recommendations of brands, products, and services. Businesses
are able to tap and analyze the customer voices and feedback generated in social media
for marketing purposes;[15] in this sense the social media is a relatively inexpensive
source of market intelligence which can be used by marketers and managers to track and
respond to consumer-identified problems and detect market opportunities. For example,
the Internet erupted with videos and pictures of iPhone 6 "bend test" which showed that
the coveted phone could be bent by hand pressure. The so-called "bend gate" controversy
[16] created confusion amongst customers who had waited months for the launch of the
latest rendition of the iPhone. However, Apple promptly issued a statement saying that
the problem was extremely rare and that the company had taken several steps to make the
mobile device's case stronger and robust. Unlike traditional market research methods
such as surveys, focus groups, and data mining which are time-consuming and costly, and
which take weeks or even months to analyze, marketers can use social media to obtain
'live' or "real time" information about consumer behavior and viewpoints on a company's
brand or products. This can be useful in the highly dynamic, competitive, fast-paced and
global marketplace of the 2010s.
Active approach
Social media can be used not only as public relations and direct marketing tools but also
as communication channels targeting very specific audiences with social media
influencers and social media personalities and as effective customer engagement tools.
[15] Technologies predating social media, such as broadcast TV and newspapers can also
provide advertisers with a fairly targeted audience, given that an ad placed during a sports
game broadcast or in the sports section of a newspaper is likely to be read by sports fans.
However, social media websites can target niche markets even more precisely. Using
digital tools such as Google Adsense, advertisers can target their ads to very specific
demographics, such as people who are interested in social entrepreneurship, political
activism associated with a particular political party, or video gaming. Google Adsense
does this by looking for keywords in social media user's online posts and comments. It
would be hard for a TV station or paper-based newspaper to provide ads that are this
targeted (though not impossible, as can be seen with "special issue" sections on niche
issues, which newspapers can use to sell targeted ads).
Donald Trump ranks second with 25 million followers.
[19] Modi employed social media platforms to circumvent traditional media channels to
reach out to the young and urban population of India which is estimated to be 200
million.
Engagement
Engagement with the social web means that customers and stakeholders are active
participants rather than passive viewers. An example of these are consumer advocacy
groups and groups that criticize companies (e.g., lobby groups or advocacy
organizations). Social media use in a business or political context allows all
consumers/citizens to express and share an opinion about a company's products, services,
business practices, or a government's actions. Each participating customer, non-customer,
or citizen who is participating online via social media becomes a part of the marketing
department (or a challenge to the marketing effort). Whereas as other customers read
their positive or negative comments or reviews. Getting consumers, potential consumers
or citizens to be engaged online is fundamental to successful social media marketing
.[20] With the advent of social media marketing, it has become increasingly important to
gain customer interest in products and services. This can eventually be translated into
buying behavior, or voting and donating behavior in a political context. New online
marketing concepts of engagement and loyalty have emerged which aim to build
customer participation and brand reputation.
Campaigns
Local businesses
Small businesses also use social networking sites as a promotional technique. Businesses
can follow individuals social networking site uses in the local area and advertise specials
and deals. These can be exclusive and in the form of "get a free drink with a copy of this
tweet". This type of message encourages other locals to follow the business on the sites in
order to obtain the promotional deal. In the process, the business is getting seen and
promoting itself (brand visibility).
Small businesses also use social networking sites to develop their own market research
on new products and services. By encouraging their customers to give feedback on new
product ideas, businesses can gain valuable insights on whether a product may be
accepted by their target market enough to merit full production, or not. In addition,
customers will feel the company has engaged them in the process of co-creation—the
process in which the business uses customer feedback to create or modify a product or
service the filling a need of the target market. Such feedback can present in various
forms, such as surveys, contests, polls, etc.
Nike #MakeItCount
.
Purposes and tactics
One of the main purposes of employing social media in marketing is as a
communications tool that makes the companies accessible to those interested in their
product and makes them visible to those who have no knowledge of their products
.[26] These companies use social media to create buzz, and learn from and target
customers. It's the only form of marketing that can finger consumers at each and every
stage of the consumer decision journey
.[27] Marketing through social media has other benefits as well. Of the top 10 factors that
correlate with a strong Google organic search, seven are social media dependent. This
means that if brands are less or non-active on social media, they tend to show up less on
Google searches
.[28] While platforms such as Twitter, Facebook, and Google+ have a larger number of
monthly users, the visual media sharing based mobile platforms, however, garner a
higher interaction rate in comparison and have registered the fastest growth and have
changed the ways in which consumers engage with brand content. Instagram has an
interaction rate of 1.46% with an average of 130 million users monthly as opposed to
Twitter which has a .03% interaction rate with an average of 210 million monthly users.
[28] Unlike traditional media that are often cost-prohibitive to many companies, a social
media strategy does not require astronomical budgeting.